Offensive Security Certified Professional
Offensive Security Certified Professional (OSCP, also known as OffSec Certified Professional) is an ethical hacking certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution (successor of BackTrack).[1] The OSCP is a hands-on penetration testing certification, requiring holders to successfully attack and penetrate various live machines in a safe lab environment.[2] It is considered more technical than other ethical hacking certifications,[3][4] and is one of the few certifications that requires evidence of practical penetration testing skills.[5]
Recertification
[edit]The OSCP does not require recertification.[6]
Relations to other security trainings or exams
[edit]Successful completion of the OSCP exam qualifies the student for 40 (ISC)² CPE credits.
In 2015, the UK's predominant accreditation body for penetration testing, CREST,[7] began recognising OSCP as equivalent to their intermediate level qualification CREST Registered Tester (CRT).[8]
Reception
[edit]In "Kali Linux: A toolbox for pentest," JM Porup called OSCP certification "coveted" because it required passing a difficult 24-hour exam demonstrating hacking.[9] In a press release on a new chief operating officer for a security services company, the company's use of OSCP professionals was described as a strength.[10] In "The Ultimate Guide To Getting Started With Cybersecurity" Vishal Chawla of Analytics India Mag recommended OSCP as one of two "well known" security certifications.[11] In an interview of Offensive Security CEO Ning Wang, Adam Bannister of The Daily Swig discussed a "major update" to "Penetration Testing with Kali Linux (PWK)" training course, which leads to OSCP certification for students who pass the final exam.[12] The training updates were discussed in detail in helpnet security.[13]
In The Basics of Web Hacking: Tools and Techniques to Attack the Web, Josh Pauli called OSCP "highly respected."[14] Cybersecurity Education for Awareness and Compliance gave a syllabus outline of the training course for OSCP.[15] In Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails, co-author Christopher Hadnagy listed OSCP as one of his qualifications.[16] Certified Ethical Hacker (CEH) Foundation Guide listed OSCP as one of two certifications by Offensive Security for a "Security Testing Track."[17] Sicherheit von Webanwendungen in der Praxis also included OSCP in a list of recommended certifications.[18] Building a Pentesting Lab for Wireless Networks called Offensive Security training "practical and hands-on" and said they were "most recommended."[19]
In "The Information Security Undergraduate Curriculum: Evolution of a Small Program" Lionel Mew of University of Richmond said 35% of Information security jobs require certifications, and described OSCP as a "popular certification."[20] "Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance" called OSCP an "advanced certification" and one of "a select few" requiring hands-on penetration skills demonstrations.[21]
References
[edit]- ^ "Offensive Security Certified Professional". Offensive Security. Archived from the original on 12 October 2016. Retrieved 13 October 2016.
- ^ Linn, Ryan (1 March 2010). "Final Course and Exam Review: Pen Testing with BackTrack". EH-Net Online Mag. Archived from the original on 17 December 2018. Retrieved 13 October 2016.
- ^ Westfall, Brian (15 July 2014). "How to Get a Job as an Ethical Hacker". Intelligent Defense. Software Advice. Archived from the original on 21 May 2017. Retrieved 13 October 2016.
- ^ Dix, John (11 August 2016). "How well does social engineering work? One test returned 150%". Network World. Archived from the original on August 11, 2016. Retrieved 13 October 2016.
- ^ "Offensive Security FAQ". 2018-09-13. Archived from the original on 2018-09-13. Retrieved 2023-05-15.
- ^ Knowles, William; Baron, Alistair; McGarr, Tim (26 May 2015). Analysis and recommendations for standardization in penetration testing and vulnerability assessment: Penetration testing market survey (Report). BSI Group & Lancaster University. Archived from the original on 10 February 2019. Retrieved 13 October 2016.
- ^ "CREST Signs New Partnership with Offensive Security to Improve the Standards of Information Security" (Press release). CREST and Offensive Security. 4 August 2015. Archived from the original on 7 September 2018. Retrieved 6 September 2018.
- ^ "Kali Linux : Une boîte à outils pour pentest - Le Monde Informatique". LeMondeInformatique (in French). 25 February 2020. Archived from the original on 2020-04-02. Retrieved 2020-03-15.
- ^ "Anchin, Block & Anchin LLP Expands Firm's Cybersecurity Practice - Tab Bradshaw Joins as New Leader of Redpoint Cybersecurity LLC". Benzinga. Archived from the original on 2020-04-20. Retrieved 2020-03-15.
- ^ Chawla, Vishal (2020-02-24). "The Ultimate Guide To Getting Started With Cybersecurity". Analytics India Magazine. Archived from the original on 2020-04-18. Retrieved 2020-03-15.
- ^ "'We're our own focus group' – Ning Wang on security certification, training, and keeping Kali Linux on top". The Daily Swig | Cybersecurity news and views. 2020-03-03. Archived from the original on 2020-03-13. Retrieved 2020-03-15.
- ^ "Offensive Security releases major update to its Penetration Testing with Kali Linux training course". Help Net Security. 2020-02-11. Archived from the original on 2020-08-09. Retrieved 2020-03-15.
- ^ Pauli, Josh (2013-06-18). The Basics of Web Hacking: Tools and Techniques to Attack the Web. Elsevier. p. 140. ISBN 978-0-12-416659-2.
- ^ Ismini, Vasileiou; Steven, Furnell (2019-02-22). Cybersecurity Education for Awareness and Compliance. IGI Global. pp. 233–234. ISBN 978-1-5225-7848-2. Archived from the original on 2024-06-09. Retrieved 2020-10-03.
- ^ Hadnagy, Christopher; Fincher, Michele (2015-03-18). Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. John Wiley & Sons. pp. viii. ISBN 978-1-118-95848-3. Archived from the original on 2024-06-09. Retrieved 2020-10-03.
- ^ Rahalkar, Sagar Ajay (2016-11-29). Certified Ethical Hacker (CEH) Foundation Guide. Apress. p. 184. ISBN 978-1-4842-2325-3. Archived from the original on 2024-06-09. Retrieved 2020-10-03.
- ^ Rohr, Matthias (2018-03-19). Sicherheit von Webanwendungen in der Praxis: Wie sich Unternehmen schützen können – Hintergründe, Maßnahmen, Prüfverfahren und Prozesse (in German). Springer-Verlag. p. 447. ISBN 978-3-658-20145-6. Archived from the original on 2024-06-09. Retrieved 2020-10-03.
- ^ Fadyushin, Vyacheslav; Popov, Andrey (2016-03-28). Building a Pentesting Lab for Wireless Networks. Packt Publishing Ltd. p. 234. ISBN 978-1-78528-606-3. Archived from the original on 2024-06-09. Retrieved 2020-10-03.
- ^ Mew, Lionel (2016). "The Information Security Undergraduate Curriculum: Evolution of a Small Program" (PDF). 2016 Proceedings of the EDSIG Conference. 2: 5. Archived (PDF) from the original on 2021-07-24. Retrieved 2020-03-15.
- ^ "Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance" (PDF). Journal of Information Systems Education. 28: 106. December 2017. Archived (PDF) from the original on 2024-06-09. Retrieved 2020-03-15.